Searched refs:secctx (Results 1 - 12 of 12) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/include/linux/netfilter/
H A Dxt_SECMARK.h19 char secctx[SECMARK_SECCTX_MAX]; member in struct:xt_secmark_target_info
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/include/linux/netfilter/
H A Dxt_SECMARK.h19 char secctx[SECMARK_SECCTX_MAX]; member in struct:xt_secmark_target_info
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netlabel/
H A Dnetlabel_user.c101 char *secctx; local
117 &secctx,
119 audit_log_format(audit_buf, " subj=%s", secctx);
120 security_release_secctx(secctx, secctx_len);
H A Dnetlabel_unlabeled.c436 char *secctx = NULL; local
503 &secctx,
505 audit_log_format(audit_buf, " sec_obj=%s", secctx);
506 security_release_secctx(secctx, secctx_len);
537 char *secctx; local
560 &secctx, &secctx_len) == 0) {
561 audit_log_format(audit_buf, " sec_obj=%s", secctx);
562 security_release_secctx(secctx, secctx_len);
599 char *secctx; local
621 &secctx,
1136 char *secctx; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cachefiles/
H A Dsecurity.c25 _enter("{%s}", cache->secctx);
33 if (cache->secctx) {
34 ret = set_security_override_from_ctx(new, cache->secctx);
H A Ddaemon.c77 { "secctx", cachefiles_daemon_secctx },
497 * - command: "secctx <ctx>"
501 char *secctx; local
510 if (cache->secctx) {
515 secctx = kstrdup(args, GFP_KERNEL);
516 if (!secctx)
519 cache->secctx = secctx;
H A Dbind.c279 kfree(cache->secctx);
H A Dinternal.h81 char *secctx; /* LSM security context */ member in struct:cachefiles_cache
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/extensions/
H A Dlibxt_SECMARK.c28 XTOPT_POINTER(struct xt_secmark_target_info, secctx)},
44 printf("selctx %s", info->secctx);
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/extensions/
H A Dlibxt_SECMARK.c28 XTOPT_POINTER(struct xt_secmark_target_info, secctx)},
44 printf("selctx %s", info->secctx);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/
H A Dcred.c704 * @secctx: The LSM security context to generate the security ID from.
711 int set_security_override_from_ctx(struct cred *new, const char *secctx) argument
716 ret = security_secctx_to_secid(secctx, strlen(secctx), &secid);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dxfrm.h655 char *secctx; local
660 security_secid_to_secctx(secid, &secctx, &secctx_len) == 0) {
661 audit_log_format(audit_buf, " subj=%s", secctx);
662 security_release_secctx(secctx, secctx_len);

Completed in 132 milliseconds